Shaaf - CV
Shaaf - CV
Home : Kakshal hameed abad house#170 near Asia Gate Peshawar, 25000, Peshawar,
Pakistan
LinkedIn: https://www.linkedin.com/in/syed-shaaf-banoori-6a62141a0
Gender: Male Date of birth: 09/10/2000 Nationality: Pakistani
ABOUT ME
I am a dedicated cybersecurity enthusiast with a strong SQA engineering background, poised to
make a transformative impact as a Pentester. My unwavering passion for cybersecurity, honed
technical expertise, and commitment to continuous learning drive my pursuit of excellence. By
actively participating in volunteer initiatives and leveraging my collaborative spirit, I aspire to
contribute meaningfully to the field while ensuring a secure digital landscape for all.
DIGITAL SKILLS
Cyber Security | kali Linux | Programming Languages: C, C++, Python, Matlab | leadership and
team management | Functional and Non Functional Testing | Jira, ClickUp
PROJECTS
[ 01/08/2023 – Current ] Content at Scale
Currently working as a QA Tester on this project.It’s an AI based website which creates content for
social media which is free from plagiarism and AI detection.
Link: https://contentatscale.ai/
Have worked as a QA Tester on this project.It’s a blockchain based website with a native token PNG.
Link: https://app.pangolin.exchange/
[ 13/03/2023 – 01/08/2023 ] Allivet
Currently working as a QA Tester on this project.It’s a pet accessory and products e-commerce site.
Link: https://www.allivet.com/
Have made Email Scrapper in Python Language which returns all the emails from the targeted
website.
Have made Brute Force Algorithm in Python Language which guesses the correct password.
Have made a DNS Server in Python Language which return us the IP Address of the targeted
website.
Have made Advance Calculator in Python as well as C++ language which performs basic as well as
complex calculations
Have made a project of MAC Flooding Attack in GNS3 and attacked on the switch with the help of
Kali Linux attached with on of the ports of the switch.
In DHCP starvation attacks, an attacker floods the DHCP server with DHCP requests to use up all
the available IP addresses that the DHCP server can issue.
DHCP spoofing occurs when an attacker attempts to respond to DHCP requests and trying to list
themselves (spoofs) as the default gateway or DNS server, hence, initiating a man in the middle
attack.
A UDP flood is a type of denial of service attack in which a large number of User Datagram Protocol
(UDP) packets are sent to a targeted server with the aim of overwhelming that device’s ability to
process and respond.
WORK EXPERIENCE
[ 13/03/2023 – Current ]
SQA Engineer
KP Data Center
City: Peshawar
1. Worked closely with the cybersecurity team to identify and mitigate vulnerabilities in the
organization's network, systems, and applications
2. Participated in tabletop exercises and simulated cyber attack scenarios to test the
organization's incident response capabilities.
3. Educated staff on cybersecurity best practices and provided training on security awareness.
4. Conducted research on emerging threats and security trends to inform the organization's
security strategy
VOLUNTEERING
[ 08/09/2021 – 19/07/2022 ] GDSC Lead UET Peshawar
[ 01/01/2020 – 01/05/2023 ] Cabinet Member - Microsoft Learn Student Ambassador | Computer Society UET Peshawar
CERTIFICATIONS
Ethical Hacking: Pentesting Tools
Introduction to Cybersecurity
Matlab Onramp
IELTS
[ 27/05/2023 – 27/05/2025 ] IELTS Score
Speaking: 7.5, Listening: 7.0, Reading: 7.5, Writing: 6.5, Overall Band Score: 7.0